Evaluating ITER Remote Handling middleware concepts
Jarich Koning; C.J.M. Heemskerk (Lector); Pepijn Schoen (Onderzoeker); Daan Smedinga (Onderzoeker); Ton Boode (Associate Lector); D.T. Hamilton
A data space system for the criminal justice chain
J. van Dijk; R. Choenni; E. Leertouwer; M. Spruit; S. Brinkkemper
Factors influencing Non-Compliance behavior towards Information Security Policies
Gilbert Silvius (Lector); Taco Dols (Lid Lectoraat)
What makes end-user training successful?
Benny de Waal (Lid Lectoraat); Ronald Batenburg (Onderzoeker)
When sheep trust the shepherd
Beate J. van Vliet (Student); J. Snoek (Begeleider); J. Bruinsma- de Beer (Begeleider)
Analysing students' use of recorded lectures through methodological triangulation
Pierre Gorissen (Stafmedewerker); Jan van Bruggen (Lector); Wim Jochems
Do individual characteristics matter? The quality of work during the implementation of a workflow management system in a Dutch social insurance company
Paul Breman (Lector); Benny de Waal (Lid Lectoraat); Ronald Batenburg (Onderzoeker)
Do employees accept the information systems that management buy ?
Paul Breman (Lector); Ronald Batenburg; Benny de Waal (Lid Lectoraat)
A Typical Case of Recommending the Use of a Hierarchical Data Format
P. Wagenaars; G.P. Bakema; E.M. Sibarani
Digital archiving & compliance
van Bussel, G.J.




























